Information Technology, Sample Thesis Papers

Thesis: Outsourcing of Information Technology

Sample Thesis Paper

Once the industrial revolution had passed, firms began to direct their attention towards methods that they could use to expand their competitive advantage in order to increase their markets and in turn their profits. Extensive integration was once considered to be a surefire formula for success became the center of criticism (Halvey & Melby Information technology outsourcing transactions: process, strategies, and contracts 2005).  By the middle of the twentieth century, firms began to realize the significance of economies of scale and the benefit that they could yield. Multiple layer management took on a form more concrete than it had ever been in as organizations began to make plans to begin outsourcing.

Continue reading “Thesis: Outsourcing of Information Technology”

Information Technology, Sample Thesis Papers

Using Finger to Enumerate nix Systems

The following is an example of how to use the Finger command on remote as well as local *nix systems for enumeration. This is a powerful command that can be used to collect info from a remote system. Boot the system into Linux with the help of the resourceful BackTrack DVD, and Enter “startx” at the provided command prompt. Open the Konsole shell and Enter “man finger” in the shell. Go throught the manual. The spacebar can be used for scrolling through the document. Continue reading “Using Finger to Enumerate nix Systems”

Information Technology, Sample Thesis Papers

Using Built-in Windows NetBIOS Tools

Before using professionally designed NetBIOS tools, it is wise for security testers to get to know how to use the ones that are built-in as part of the Windows Operating System (OS). Some such tools are the Net view, Nbtstat, and Net use commands. It is better to have a teammate work with you while practising these tools for viewing NetBIOS shares and services. Continue reading “Using Built-in Windows NetBIOS Tools”

Information Technology

Using Additional Nmap Commands

There are many variations and many new and different commands that can be used for port scanning on networks that are to be attacked. There are many other options and parameters for doing things like sending FIN, ACK, and XMAS packet at specified selected ports. These commands should be practised by security testers until they are second nature. Continue reading “Using Additional Nmap Commands”